Описание
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- Inappropriate implementation vulnerability in Extensions API can be exploited to cause denial of service.
- An elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
- Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in File System API can be exploited to cause denial of service.
- Use after free vulnerability in Tab Groups can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Indexed DB can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Extensions API can be exploited to cause denial of service.
- Use after free in Bookmarks vulnerability can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in Safe Browsing can be exploited to cause denial of service.
- A spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
- Use after free vulnerability in Messaging can be exploited to cause denial of service or execute arbitrary code.
- Type confusion vulnerability in V8 can be exploited to cause denial of service.
- Use after free vulnerability in Performance Manager can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in App Service can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
- Insufficient policy enforcement in COOP can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in PDF can be exploited to cause denial of service.
- Out of bounds read vulnerability in DevTools can be exploited to cause denial of service.
- Use after free vulnerability in WebApp Installs can be exploited to cause denial of service or execute arbitrary code.
- Insufficient validation of untrusted input in Data Transfer can be exploited to cause denial of service.
- Heap buffer overflow vulnerability in DevTools can be exploited to cause denial of service.
- Inappropriate implementation vulnerability in Extensions can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2022-1868
CVE-2022-30127
CVE-2022-1856
CVE-2022-1857
CVE-2022-1863
CVE-2022-1853
CVE-2022-1872
CVE-2022-1865
CVE-2022-1874
CVE-2022-1871
CVE-2022-26905
CVE-2022-1855
CVE-2022-1869
CVE-2022-1859
CVE-2022-1870
CVE-2022-1854
CVE-2022-1873
CVE-2022-1875
CVE-2022-1858
CVE-2022-1864
CVE-2022-1867
CVE-2022-30128
CVE-2022-1876
CVE-2022-1862
Связанные продукты
Список CVE
- CVE-2022-1862 warning
- CVE-2022-1865 warning
- CVE-2022-1867 warning
- CVE-2022-1871 warning
- CVE-2022-1857 warning
- CVE-2022-1872 warning
- CVE-2022-1873 warning
- CVE-2022-1868 warning
- CVE-2022-1858 warning
- CVE-2022-1859 warning
- CVE-2022-1863 warning
- CVE-2022-1874 warning
- CVE-2022-1855 warning
- CVE-2022-1876 warning
- CVE-2022-1869 warning
- CVE-2022-1870 warning
- CVE-2022-1853 warning
- CVE-2022-1854 warning
- CVE-2022-1856 warning
- CVE-2022-1875 warning
- CVE-2022-1864 warning
- CVE-2022-30127 high
- CVE-2022-26905 warning
- CVE-2022-30128 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!